Bug ID 551819: NTLM Type 1 message no longer sets NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY flag

Last Modified: Sep 13, 2023

Affected Product(s):
BIG-IP APM, Install/Upgrade(all modules)

Known Affected Versions:
12.0.0, 12.1.0 HF1, 12.1.0 HF2, 12.1.1 HF1, 12.1.1 HF2, 12.1.2 HF1, 12.1.2 HF2

Fixed In:
12.1.0, 12.0.0 HF1

Opened: Oct 09, 2015

Severity: 3-Major

Symptoms

In some NTLM deployment, the NTLMv1 & NTLMv2 SSO will fail, after upgrading to 12.0.0 release.

Impact

NTLMv1 and NTLMv2 SSO might fail.

Conditions

NTLM server rejects the Type 1 message when NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY flag is not set.

Workaround

None

Fix Information

NTLM Type 1 message will set NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY flag now.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips